Targeted Automation for Malware Analysis

December 16, 2020 •  Online, Worldwide

Please join us for a webinar on December 16 at 2:00 pm ET / 11:00 am PT. If you are unable to make it live, we’ll provide the recording to everyone who registers

Targeted Automation for Malware Analysis

In order to answer analytical questions which drive threat intelligence, manual malware analysis becomes a necessity, but is time consuming and does not scale well. In this talk, we discuss automation approaches towards targeted malware of interest using open source tools, and the benefits of this approach to the reverse engineer, threat intel analyst, and overall collaboration within the organization.




Dan Dash

Intrusions/Malware Reverse Engineer

Cipher Tech Solutions

In 2012 Dan Dash was lured away from the bureaucracy of the NY Dept. of Education where he was teaching math (or, at least, was trying to) to join the entirely bureaucracy free Department of Defense as an entry-level Malware Reverse Engineer for Cipher Tech Solutions, Inc. After spending the next 7 years honing his skills, finally learning some Python, and writing hundreds of configuration parsers, technical reports, and YARA signatures, he now runs commercial efforts geared towards helping the Fortune 100 better protect their networks from targeted malicious code. Dan spends his free time crafting and devouring delectable delights, tackling the gym, and trying to remember that thing he forgot to do.